Ideas - School of Computing

advertisement
Project Ideas
Edited mjr 13.11.15
The majority of students who take the MSc dissertation module come up with their own initial
idea for their project. They then develop this idea with the help of a supervisor.
If you do not yet have a firm idea of what you would like to do for your MSc project, have a
look at the project ideas below. Please note that the ideas are a mixture of old ideas and
new ideas. You should contact the staff members to find out whether the project ideas are
still available. If an idea is not available, it will often be possible to suggest something similar.
You can find information on staff email addresses and room numbers on the School website:
http://www.napier.ac.uk/soc/staff/Pages/staff.aspx .
If you are on the MSc in Blended and Online Education, you should also consult the online
programme handbook which you can access through http://www2.napier.ac.uk/ed/boe.
The ideas are grouped according to four areas:
 Software Engineering
 Computer Systems and Networking
 Information Systems
 Digital Media and Interaction Design
At the end of this document there is a list of project titles that have been run in the past.
These might be a source of inspiration.
There is a list of honours project ideas at http://soc-honours-project-ideas.wikispaces.com/ .
In many cases, similar topics can be used for honours or MSc level. So some of these ideas
will be useful too.
Software Engineering



Kevin Chalmers
o Games Development Projects
o 3D Graphics Programming Projects
o CUDA Related Projects
Andrew Cumming
o Robot Applications
o Tutorial Quality Metrics
o Topic Specific Brain Training Games
o Automatic Processing of Student Attendance Records
Lu Fan
o Authentication and Authorisation within a Cloud Computing Environment
o Automated Deployment and Maintenance of Apache Cassandra Clusters











Emma Hart
o Optimisation algorithms
o Investigation of learning algorithms using robotic simulation
o Agent-based modelling simulation of processes/systems (e.g biological, social
etc.)
Rob Kemmer
o Bluetooth Predictive Texting for the PC
o Ethical Decision Support Environment
Jessie Kennedy
o Developing a Gene Annotation Browser Component
o Developing an Interactive Hierarchical Clustering Component for Microarray
Data
o Information Visualisation Ontology
o Reuse of visualisation components
Ben Kenwright
o Physics-based Development Projects
o Fluids/Soft-body/Cloth/Rigid-body Related Projects
Alistair Lawson
o Social Media Monitoring: Edinburgh Council are looking to gather feedback
on their services to support, and with a view to shifting to online delivery.
Could focus on Sentiment Analysis and/ or Social Network Analysis.
o Pronunciation Analysis: Working with the Languages department at
Edinburgh Napier on Computer Aided Pronunciation Tools
o Video Analysis: for HealthCare Applications of open-source software that
reveals invisible motion and detail in video
Xiaodong Liu
o Towards green pervasive systems
o A survey on Behaviour-Driven Development (BDD)
o A semantic repository for cloud services
o Integrating BDD (Behaviour-Driven Development) with Agile methodology
o Integrating TDD (Test-Driven Development) with Agile methodology
John Owens
o Using probability models to infer language sentiment
o Using probability models to predict language
o Natural language generation
Taoxin Peng
o An investigation into data error types and factors
o An investigation of Data Cleaning methods and techniques
Malcolm Rutter
o The use of a thesaurus to augment folksonomy-based indexing
o A light Content Management system for individual module delivery
Andrea Scott
o A User-centred design approach to website redesign and the effects of
aesthetics on usability
Sally Smith
o Evaluating performance of Mobile Applications through design and
development
o

Exploring the possibilities of augmented reality through design and
development
Neil Urquhart
o Optimisation of real work problems
o Agent based approaches to problem solving
o Intelligent agents for travel optimisation
Computer Systems and Networking


Ahmed Al-Dubai
o Providing multicast to mobile host using mobile IP
o Analysis and development of VOIP network
o Performance of attacked systems
o Performance analysis of traffic loads in BGP and EIGRP protocols
o An investigation of topology impact on the performance of a wireless network
o A novel analysis for stateful inspection
o A study of voice call failures in VOIP
o An evaluation of perimeter security using Checkpoint and PIX firewall
o Exploring security issues in an office network application in the context of
intranet technology
o An investigation into the scalability of routing protocols in mobile ad hoc
networks
Alistair Armitage
o People tracking from an embedded system: PIR detectors are cheap ways of
detecting moving people. How can they be used with small systems (Arduino,
Pi) to track people?
o Security on embedded devices: The Internet of Things promises ubiquitous
intelligent devices. How can security be handled on limited resource devices?
What encryption can a small embedded device handle? How could
o Image steganography: What are the best images to use for steganography?
How does the image compression process in JPEGs affect the image? How
much information can be hidden in an image?
o Adapting a fitness tracker for assisted living: Fitness tracking devices, such as
Microsoft's Band, are designed primarily with active young people in mind.
Could they be adapted for supporting elderly people in assisted living
environments, for instance in checking for falls and unusual patterns of
activity?
o Remote Soil/Garden monitor: Commercial devices, such as the Agriprobe,
measure soil temperature and moisture at a variety of depths, then transmit
this data to a central station. However, many of these devices are aimed at
commercial agriculture and are not suitable for small scale use (e.g. a garden
or an allotment at some distance from the owner's home). This project would
look at developing a prototype using an Arduino, Raspberry Pi or similar to
act as such a device.
o Simple gesture detection using infrared detectors: Passive infrared sensors
are often used for simple on/off applications (e.g. switching on taps and hand
driers). These give directional information too. Pairing several of these






together could give a simple hand gesture recognition device when used with
an Arduino, Raspberry Pi or similar embedded microcontroller.
Bill Buchanan
o Disk Encryption Threat Analyser
o Botnet Analysis and Detection System
o Service-Oriented Architecture for Network Device Configuration/Teaching
o Next Generation Authentication Infrastructures with Role-based Security for
Cloud Computing
o Next Generation Visual Interface for Networking Simulations
o Enhanced Event Time-lining for Digital Forensic System
o Dynamic Performance Evaluation of Intrusion Detection Systems (IDS)
Jim Jackson
o Dynamic Sensing and Analysis of Bicycle Crank Motion
o Motion Sensing Using Low-cost Accelerometers.
Petra Leimich
o In-cloud forensics
o Forensics as a service (in cloud)
o RAM Acquisition for SQLi protection
o RAM Analysis for SQLi detection
o Restoring streamed media files from fragments
o Web Browser Forensic Analysis
o An immersive game-based SQL e-tutor: User Evaluation (suitable for MSc
computing students)
o Microsoft Edge Forensics (that is the new web browser shipped with win10)
o Desktop database forensics (eg Microsoft Access and the equivalent open
office one)
Robert Ludwiniak
o A comparative study of Frame-relay and MPLS layer-3 VPNS
o Deployment of QoS IPv6 markings over IPv4 tunnel
o Analysis and mitigation of data link layer attacks that occur due to topology
flaws
o Performance analysis of the OSPF routing protocol for IPv6 (OSPFv3)
Imed Romdhani
o Performance evaluation of redundant home agents in mobile IP
o Implementation and evaluation of redundant home agents in mobile IPv6
o VPN performance analysis
o Implementation of a monitoring tool for mobile IP using SNMP
o Implementation of a secure multicast address allocation method
Gordon Russell
o Teaching SELinux
o Windows 2008 System Administration
o Virtualisation for desktop security
o A computer virus sandbox
o Windows 7 forensic hacking
o Cisco Phone emulation environment
Information Systems






Jyoti Bhardwaj
o An Investigation into the Non-Technical Factors influencing the
Implementation of x System in y Organisation
o An Investigation into the Enabling Role of Technology in the implementation
of an Organisational Innovation in x Organisation
Pritam Chita
o Benefits of an Agile Development Approach
o Second Life as a vehicle for Project Management Training
o Effective Training for IS Project Management
o Mix of Technical & Project Management Skills in the IT sector in Scotland
o Project Management skills in the Financial Services Industry
Peter Cruickshank
o Management and monitoring of (federated) online identity
o The relationship between identity and expectations of privacy
o The role culture plays in information security
o Information security implications of cloud and mobile/BYOD computing
o Issues affecting take up of technology to support students by University staff
and departments
o Data collection / analysis to understand behaviours - eg social media/twitter to
understand communities, or authentication logs to understand actual security
behaviours
Brian Davison
o Development and Evaluation of IT Policies
o Data repository and access modelling for an Intranet
o Mark-up and metadata
o Migration and Utilisation Strategy for a Geographical Information System in a
Large Voluntary Organisation
Hazel Hall
o Information/knowledge sharing for collaborative work purposes in online
environments
o Knowledge management
o Social computing
Colin Smith
o Electronic Public Services
o Online Communities and E-Commerce
o Trust and e-Commerce
o e-Commerce Integration in Virtual Worlds
Digital Media and Interaction Design

David Benyon
o New forms of Human-Computer Interaction (HCI) and Interaction Design
o Interaction with multi-touch surfaces
o Artificial Companions and companionship
o User Experience (UX)
o Blending physical and digital spaces









Tom Flint
Richard Hetherington
o A comparative investigation of the accessibility levels of Irish web sites
o An investigation of accessibility and usability of Moodle for online learning
o A comparative study of post-handover maintenance
o Towards commercial implementation of educational adaptive hypermedia
Gregory Leplatre
o See http://www.soc.napier.ac.uk/~gregory/teaching/projects.html
Iain McGregor (Please note that all of the projects below require previous
experience or training in sound production and or design.)
o Sound design and listening studies related to auditory displays, broadcast
media, interactive media or products
Malcolm Rutter
o Contrasting Multimedia Approaches to Celtic Storytelling
Ian Smith
o Design Patterns for Interactive Media
o Digital Video: Development of an eLearning Application
o Interactive Game (Flash): Development of an eLearning Application
o Interactive Simulation: Development of an eLearning Application
o Interactive Video: Development of an eLearning Application
Michael Smyth
Phil Turner
o The role of make-believe in the design of interactive technology.
o Is the suspension of involved in engaging with digital media, actually
pretending?
o Design as improvised cognition
Susan Turner
o Sustainable Interaction Design
o Ethical Interaction Design
o Reading for pleasure online
o Keepsakes on mobile devices
- what 'souvenirs' of people and places do people chose to carry with them in
the form of images, saved texts etc. on mobile devices. What would they like
to do in this regard but currently cannot? The project would investigate this by
means of interviews, observation, diary studies, critique of device design, etc.
Could have cross-cultural aspects if the student was interested.
o Personal device ecologies: many people now have access to multiple devices
with over-lapping functionality. How do we decide which device to use for
what purpose?
o International usability standards – how usable are they for the novice
designer?
A list of project titles which have been used in the past
Some students have difficulties in envisioning a suitable topic for an MSc dissertation. This list is
intended to provide ideas and inspiration.
Perhaps stating the obvious: If you take a previous project idea and study it without reference to
the previous work, you will determine your own direction, your dissertation will contain your own
ideas and be original. If you work out a way to consult the previous work, then there is a risk of nonoriginality.
Programme
Dissertation Title
AI
Prescription Alarm
AI
The factors that affect customer satisfaction on online shopping
AI
A conceptual model for content management systems
AI
Interaction between customer and employee in CRM
AI
Quantum Cryptography
AI
Extensible Information Management System
AI
AI
The impact of mobile telecommunications services on the activities of small
businesses in Nigeria
Project Tracking System
AI
E-Supervision. An Innovative model for Student Teacher supervision
AI
AI
Analysis of a Holistic Care System using Low-Power Wireless Sensor Networks
and a Multi-Patient Risk Assessor
Utility Payments Through ATMS
AI
A Novel K-Partie Graph Layout
AI
Providing Strategic Direction in AI Algorithms for Turn Based Strategy Games
AI
Extensible Information Management System
AI
The Implementation of a Carbon Calculator App to Automatically Detect Bus and
Car Travel in and around Edinburgh
Critical evaluation on jClouds and Cloudify abstarct APIs against EC2, Azure and
HP-Cloud by creation of a prototype web service cloud console
Public Wireless Internet: User Perception and Trust, Compared to Security
Threats Found
AI
AI
AI
AI
AI
Real factors behind the low adoption rate of e-government in Saudi Arabia
Exploring the craft of hypermedia systems design: producing findable content in a
data-saturated world
Evaluation of wireless transport protocols over multi-hop networks using 802.11e
EDCA parameters to provide performance enhancements
AI
An innovative model for student teacher supervision
AI
AI
The study of performance of UK and Chinese top travel agency websites
AI
AN
Theory of Automated Timetabling and Scheduling
Automatic XSS detection and snort signatures/ACLs generation by the means of
a cloud-based honeypot system
Evaluation of virtual firewalls in virtualized environment
AN
Performance evaluation of the IPS integrated in Juniper and Cisco routers
AN
Comparison of IPv4 and IPv6 QoS Performance for Latency Sensitive
Applications
Performance evaluation of Internet Key Exchange protocols
AN
AN
AN
The Engaged Reader. A human-centred evaluation of eBook user experience
AN
Analysis of maximum areas size in a non-broadcast network using OSPFv3 and
IS-IS for IPv6.
Comparison between Dual-Stack networks and 6to4 tunnelling in terms of QoS
AN
Performance Evaluation of MANET Routing Protocol
AN
A new web bases approach for e-monitoring of online exams through
cryptography
AN
The Analysis of Convergence of OSPF Protocol
AN
Mobile Supermarket Application
AN
Performance comparison between EIGRP and OSPFv3
AN
Network Infrastructure Migration and Network Automation
AN
Analysis of OSPF and IS-IS Routing Protocols
AN
An investigation into utility payments through ATMs in rural India
AN
Mobile Supermarket Application
AN
Performance comparison between EIGRP and OSPFv3
AN
The Analysis of Convergence of OSPF Protocol
AN
Protecting a web server from TCP SYN flood attacks
AN
AN F/T
Simulation and analysis of MANET routing protocols
A Scalable, Cloud-based Internet of Things using IPv6
AN F/T
The Value of eBooks at Edinburgh Napier University - An Interpretive Study
AN F/T
Performance analysis of traffic loads in EIGRP protocol in real time applications
AN F/T
Evaluation of IPV6 PE over MPLS
AN F/T
Analysis and Evaluation of Secure Neighbour Discovery (SEND) protocol as a
way to mitigate threats to Neighbour Discovery Protocol (NDP) in IPv6
Analyses of IP QoS Requirements over MLSP VPN
AN F/T
AN F/T
AN F/T
AN F/T
AN F/T
AN F/T
ASDF
Performance analysis of AODV protocol under black hole attack
Comparison and evaluation of Fast Handover methods in Mobile IPV6 Networks &
Suggestion of the Most proper Method
Achieving better fast handover across a NetNet
Comparison of 3G and 4G technologies Regarding the QOS
VoIP QoS Assessment using a Simulated Environment
ASDF
Study of advantages of a cloud system that provides virtual machines for a hostbased digital forensic learning course
Real-time tracking on android phones
ASDF
Application to mitigate cyber security threats
ASDF
iPhone Data Acquisition and Analysis
ASDF
Security Issues in Mobile Applications
ASDF
ASDF
An investigation into whether the use of virtual images as a platform of an
everyday computer can secure a system while maintaining usability, reliability
and flexibility.
Detecting SQL injection attacks using the Web based honeypot
ASDF
An overview of small-block forensics
ASDF
A Platform for Digital Forensics Evaluation of Tools (D-FET)
ASDF
Evaluation of tools to prevent Border Gateway Protocol misconfigurations
ASDF
Virtual Firewall Evaluation System (VFES) in a Private Cloud Platform
ASDF
Android Forensic Capability and Evaluation of extraction Tools
ASDF
ASDF
ASDF
ASDF
ASDF
ASDF
ASDF
iPhone Data Acquisition and Analysis
Policy based Network Optimization
Security Issues in Mobile Applications
Detecting SQL injection attacks using the Web based honeypot
Forensics in Voice over IP Networks
Dropbox: Forensic Detection
Novel Approaches to the Classification of High Entropy File Fragments
ASDF
Private Browsing Forensics
ASDF
ASDF
ASDF
ASDF
Mutual authentication and phishing - a clear case of user confusion
Anti-forensic timestamp analysis and countermeasures
Cloud storage synchronization analysis, filtering and detection
Investigation into a digital forensics triage tool using sampling, hashes and bloom
filters - SHAFT
An overview of small-block forensics
Next Generation Authentication Infrastructures with Role-Based Security for
Cloud Computing
A layered approach to visualising security event data
Implementation and evaluation of a botnet analysis and detection methods in a
virtual environment
Creation and evaluation of a virtual learning environment for penetration testing
training.
Identity and Access Management in a Corporate Context
An investigation into the benefits of user education by leveraging data
classification and provenance systems for information assurance
ASDF
ASDF
ASDF
ASDF
ASDF
ASDF (DL)
ASDF (DL)
ASDF Dl (pt)
Assessment of Windows 8 Forensic Artefacts
ASDF F/T
ASDF F/T
A Comparative Study of Windows 8 and Windows 7 Forensics
Saudi Arabian information security compliance with local and international
website standards
DNS Defence Mechanisms: Best Practices for Defence against Amplification
Attacks
Browser-Based Command Line Tool
ART, Challenges in Cloud Computing, Early Detection & Mitigation
iOS4 vs. iOS5: Data Acquisition and Evidence Gathering
ASDF F/T
ASDF F/T
ASDF F/T
ASDF F/T
ASDF F/T
ASDF F/T
ASDF F/T
ASDF F/T
ASDF F/T
ASDF F/T
ASDF F/T
ASDF P/T
ASDF P/T
ASDF P/T
ASE
ASE
ASE
ASE
ASE
ASE
ASE
ASE
ASE
ASE
ASE
Implementation of a secure Multicast Address Allocation
Exploration and Evaluation of a Novel DDoS Amplification Attack
Counter Forensics on the Android Operating System
Integration of consumer electronics in automotive industry
Evaluation of Data Cloud Storage Systems
Feasibility study of popularizing the mobile fingerprint authentication to enhance
the security of mobile commerce
A game theory study for the intrusion detection system
Detecting Spam 2.0
Evaluation of V2V conversions
Forensic Triage of Mobile Devices
A location based service for the discovery of student discounts
Object Data Analysis and Survey Distribution Using Facebook
Creating Pseudo code on a Smartphone
An MVC Comparison between Development for API-centric Cloud Paas and
Traditional Web Hosting Platform
Formal Methods and Eclipse Modelling Framework: from B code to C#
An investigation of the suitability of stochastic search algorithms for solving TSP
problems on a mobile platform
The Development and Evaluation of a HTML5-based Distributed Computing
Platform.
Automatic speech recognition for radiologists
Impact of social media on consumer behaviour
Design, Implementation and Evaluation of Football Injuries Expert System for the
Web
Investigating the use of ageing strategies for the opt-IA algorithm
ASE
The use of web-based services to present stock market information on the
majority of touchscreen smartphones in a user-friendly interface
ASE F/T
Cellular Base Station Placement Using Generic Algorithm
BIT
Evaluation of social media effects on marketing communication: the Pakistan
consumers’ perspective
E-Government in Saudi Arabia
Impacts of Social Media on Online Collaborative Work
Helping SMEs take on erp solution: a theoretical approach
Development and evaluation of a generic website CMS with MS SharePoint
which support Prince2
Developing e-commerce in using online communities
Investigating Data Warehousing Models in Health Insurance
Spiritual Intelligence in Business Context among IT Professionals
Cloud Computing - Issues and Challenges
Cloud Computing - effective process for Scottish law firms
Analysis of Business Process Optimization approach and its practical use within
the company Bosch Diesel
Investigating Data Warehousing models in Health Insurance
Artificial Companions Contemporary Challenges in Human Society
Leadership in Project Management
Key factors for a successful Business Intelligence implementation for SME
Information security management
The report for finding the success factors of quality control in the project
management by analysing the projects in Indian software industry
BIT
BIT
BIT
BIT
BIT
BIT
BIT
BIT
BIT
BIT
BIT
BIT
BIT
BIT
BIT
BIT
BIT
BIT
BIT
BIT
BIT
BIT
BIT
BIT
BIT F/T
BIT F/T
BIT F/T
BIT F/T
BIT F/T
BIT F/T
BIT F/T
BIT F/T
BIT F/T
BIT F/T
BOE
BOE
The transition from project delivery to service management: a case study within
the NHS using PRINCE2 and ITIL
Cloud Migration for SMEs using a Service Oriented Approach
Management issues surrounding the adoption of big data technologies
Teaching/Training environments for project management
A study of the current state and acceptance of information security in small and
medium-sized enterprises
Business Process Reengineering before implementing ERP systems
Implementation of BPMSOA methodology to enhance enterprise agility
A Content Management System for a Society Website
An evaluation of Fashion Retail Website Quality
An Investigation of Security Issues in Cloud Computing
An Investigation of Approaches to Reducing the Size of Databases
E-government in Saudi Arabia
An examination of SOA collaboration model with MDA in the implementation of
B2C application frameworks
A Content Management System for a Society Website
The Prototype Design and Evaluation of a Second-hand Trading Website for
Chinese Students Based on User-Centred Design
IT Security policies and BYOD: a study of Glasgow, Edinburgh, Heriot-Watt and
Napier University
Routes to Cloud Migration: SMEs Perspective
Social media plug-ins on commercial websites: how effective are they as
endorsement tools?
The Pedagogical Value of Using Social Media in a Scottish University Business
School
Web Conferencing in Higher Education: Towards a Strategy for Effective Staff
Development
BOE
BOE
Attitudes to e-learning for continued professional development in further
education
A study of students' experiences of a structured Academic Advisor support group
framework and factors relating to blended learning and mobile technologies
which may enhance the experience
BOE
The Value of eBooks at Edinburgh Napier University - An Interpretive Study
BOE
An exploration of key themes and issues surrounding the use of e-portfolios for
employability and work-based learning at Leeds Metropolitan University
BOE
Contextualised Simulation Game Design and its impact upon the Vocational
Learning Experience
What impact does the e-ilp have on the ability of learners to set, manage and
achieve personal goals/targets
Assessment Feedback: do students prefer feedback to be delivered electronically
online in text format and to what extent can an electronic model contribute to a
positive impact on students’ academic performance?
An investigation into the effectiveness of a holistic model for implementing
asynchronous online discussion in secondary schools.
An investigation into effective blended and online learning initiatives for Small
Higher Education Institutions
A Study of staff attitudes to and experiences of using digital technology: Barriers
and Enablers
Evaluation of user engagement attributes via questionnaire and via facial motion
tracking system
Proof of Concept. University's classrooms availability
BOE
BOE
BOE
BOE
BOE
COMP
COMP
COMP
Comp F/T
Android application development: ENUMoodle
Sticky Policies for Data Governance in the Cloud
Comp F/T
Development of a Limited Domain Speech Recognition Application
Comp F/t
Comp F/t
Performance comparison of a C++ and the Java implementation of a
Communicating Sequential Programming Library
The Impact of M-Learning through LMS on Nigerian secondary school students
Comp F/T
Development of a Limited Domain Speech Recognition Application
Comp F/T
Tracking file changes through VMWare image and snapshot analysis
COMP P/T
A critical evaluation of the use of ICT in the public sector primary schools in Saudi
Arabia and the teachers' requirements for its improvement
E-commerce for the visually impaired
EWD
FECCI
FECCI
FECCI
FECCI
FECCI
FECCI
FECCI
Design, development and analysis of cloud-based application using windows
azure
Wireless body are network for heart rate monitoring
To what extent is emerging software for mobile device development solving
cross-platform compatibility.
Implementing the connect website which encourages the woman to study in
engineering
An investigation into establishing the value of and methods necessary in
providing meaningful feedback for learning.
Motivations for releasing an e-participation application under the EUPL open
source licence
Analysis of the challenges faced in the delivery of information systems within a
police environment
FECCI
A data hiding security mechanism using video steganography
FECCI
Personal Relationships with the City
Network Security: Mitigating IP Spoofing
FMP (FECCI)
FMP (FECCI)
Agent based mobile application for day-trader
FMP (FECCI)
FMP (FECCI)
Risk aversion and improving customer satisfaction in E-commerce for small
organisations
Evaluating and mitigating the Significance of I/O bottlenecks in database
virtualization
A new approach for spam detection system with e-mail abstraction scheme
FMP (FECCI)
Database as a Service: Cloud database technology and Its Future Trends
FMP (FECCI)
Delivering Reminders on Tabletop devices
FMP (FECCI)
A new approach for spam detection system with e-mail abstraction scheme
FMP (FECCI)
Database as a Service: Cloud database technology and Its Future Trends
ICT
"Flying Solo" Managing Software projects
IS F/T
A critical evaluation of the use of ICT in the public sector primary schools in Saudi
Arabia and the teachers' requirements for its improvement
IS:UE
ISD
The Design and Evaluation of a Journal Article Reader to promote a captivating
experience of reading academic materials.
Greensight: The prototype of a web-based auditing tool to evaluate the carbon
footprint of the computing equipment of an organisation
E-government in Developing Countries
ISD
An analysis of dynamic system development method
ISD
An Exploratory Study: Young People's Perception and Awareness of Computing
Careers
ISD
ISD
Microblog sentiment capture - a visual approach to socio-political polarity
Using Social Media Tools to Address International Student Acclimatization
Issues: Development of an Online Exam and Course Preparation Portal
ISD
ISD
An analysis of dynamic system development method
Creating a game based learning platform to teach SQL
ISD
A case study of risk attitudes and perception at health protection Scotland
ISD F/T
ISD F/T
Smoking effects - simulating the possible effects and risks of smoking on human
body with made web based application
Virtual Help Desk
ISD F/T
Virtual Help Desk
ISD F/T
Development of a mobile travel guide for Perth city
ISD P/T
ISUE
Disconnected democracy? A Study of Scottish Community Councils' online
communications
A Proposal for an Experience Evaluation Technique to be incorporated into the
User Centred Design Process pre-production
Initial Prototype to help visually impaired people navigate the city safely
ISUE
Designing websites with personality
ISUE
A taste of Edinburgh: being there and with others
ISUE
Explore and design a kind of interface for social media personalisation
Balancing support and independence in the construction of a CSS tutorial
resource
Critical Comparison and Evaluation on the Major MVC Frameworks through the
use of a Prototype Web Application
Student project performance management system for effective final year and
dissertation projects supervision
Student project performance management system for effective final year and
dissertation projects supervision
FMP (FECCI)
ISD
ISUE
STW
STW
STW
STW
STW
STW
STW
STW
Web based visualisation of single taxonomy trees
The Design and Evaluation of a Real-Time Visualisation Tool for Assessing a
Singer's Vocal Range
Assessing and implementing usability in a mobile application for the Edinburgh
doors open day event
STW F/T
Personalised filter system for Tweets
A study of Nicole Lazzaro's Theory of Fun on iPhone applications
STW F/T
Analysing the Distractions found with Mobile Technology whilst Driving
STW F/T
Wearable Technology. The changing face of HCI
© Edinburgh Napier University
Download